Top Banner
POWERFUL NETWORK SECURITY MONITORING FOR COMPLETE VISIBILITY To find the latest threats, security teams need increased visibility across their networks, including areas not covered by other tools currently in their security stack. Yet they struggle to see the full context of unusual network behavior that’s required to adequately monitor and defend their businesses against new, unknown potential attacks. CrowdStrike Falcon® Network Security Monitoring is a service that utilizes both the expertise of CrowdStrike® Services threat hunters and a network appliance that detects threats present in a customer’s environment. It’s easy to provision, install and use, and provides the necessary visibility to prevent new attacks. Additionally, it detects traffic to and from unmanaged devices and services in the customer’s environment, without the burden of managing yet another agent on the organization’s endpoints. This extensive capability for detection, response and threat hunting leverages CrowdStrike’s machine-learning capabilities as well as CrowdStrike Intelligence indicators of compromise (IOCs) and indicators of attack (IOAs) to detect both known and unknown malicious activity. Delivering complete network visibility, detection and threat hunting as a service CrowdStrike Services FALCON NETWORK SECURITY MONITORING KEY BENEFITS Provides visibility across your entire network, analyzing network traffic and hunting for threats to detect the next attack on your environment Integrates the latest IOCs and IOAs from across the globe to detect threats quickly Utilizes multifaceted detection mechanisms to detect both known and unknown threats and unusual network behavior Enhances your endpoint protection solution with complete visibility of network traffic and intrusions Includes an easy-to-use physical or virtual appliance that delivers frictionless deployment with no additional hardware required, reducing your IT costs
2

FALCON NETWORK SECURITY MONITORING€¦ · Network Security Monitoring to detect non-malware attacks. Multi-faceted detection capabilities: Gain complete network visibility to detect

Jul 28, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: FALCON NETWORK SECURITY MONITORING€¦ · Network Security Monitoring to detect non-malware attacks. Multi-faceted detection capabilities: Gain complete network visibility to detect

POWERFUL NETWORK SECURITY MONITORING FOR COMPLETE VISIBILITY To find the latest threats, security teams need increased visibility across

their networks, including areas not covered by other tools currently in

their security stack. Yet they struggle to see the full context of unusual

network behavior that’s required to adequately monitor and defend their

businesses against new, unknown potential attacks.

CrowdStrike Falcon® Network Security Monitoring is a service that utilizes

both the expertise of CrowdStrike® Services threat hunters and a network

appliance that detects threats present in a customer’s environment. It’s

easy to provision, install and use, and provides the necessary visibility to

prevent new attacks. Additionally, it detects traffic to and from unmanaged

devices and services in the customer’s environment, without the burden

of managing yet another agent on the organization’s endpoints. This

extensive capability for detection, response and threat hunting leverages

CrowdStrike’s machine-learning capabilities as well as CrowdStrike

Intelligence indicators of compromise (IOCs) and indicators of attack

(IOAs) to detect both known and unknown malicious activity.

Delivering complete network visibility, detection and threat hunting as a service

CrowdStrike Services

FALCON NETWORK SECURITY MONITORING

KEY BENEFITS

Provides visibility across your entire network, analyzing network traffic and hunting for threats to detect the next attack on your environment

Integrates the latest IOCs and IOAs from across the globe to detect threats quickly

Utilizes multifaceted detection mechanisms to detect both known and unknown threats and unusual network behavior

Enhances your endpoint protection solution with complete visibility of network traffic and intrusions

Includes an easy-to-use physical or virtual appliance that delivers frictionless deployment with no additional hardware required, reducing your IT costs

Page 2: FALCON NETWORK SECURITY MONITORING€¦ · Network Security Monitoring to detect non-malware attacks. Multi-faceted detection capabilities: Gain complete network visibility to detect

KEY CAPABILITIES Network visibility and analysis: Falcon Network Security Monitoring provides your

organization with the network visibility necessary to detect threats and enable threat

hunting. It augments your current security tools that cannot provide the visibility necessary

in potential threat vectors like end-of-life operating systems, unmanaged endpoint

devices, network devices and Internet of Things (IoT) devices. It goes beyond known

threats and hunts for unknown threats with powerful threat hunting through network

protocol metadata analysis. With CrowdStrike Intelligence integration, IOCs and IOAs

identify threats based on behavior. Understanding sequences of behaviors allows Falcon

Network Security Monitoring to detect non-malware attacks.

Multi-faceted detection capabilities: Gain complete network visibility to detect threats

faster, before they disrupt your business operations. Falcon Network Security Monitoring

offers:

Powerful threat hunting through network protocol metadata with IOC detection

leveraging CrowdStrike Intelligence

Automated IOA detection using network metadata with machine-learning-enabled

detection of malicious files

Full network traffic capture to extract malware and enable analysis of at-risk data

A fully integrated intrusion detection system (IDS)

Network appliances: Choose between physical network appliances or virtual network

appliances.

The Falcon Network Security Monitoring virtual appliance offers rapid deployment to

your pre-existing hypervisors, saving you time, effort and money.

Both physical and virtual appliances are easy to deploy, install and use. They are

designed to work effectively within your organization’s current IT stack. Falcon Network

Security Monitoring is the fastest and easiest way to get the visibility needed to detect

attacks across your network.

CrowdStrike Services equips organizations with the protection and expertise they need to defend against and respond to security incidents. Leveraging the cloud-delivered CrowdStrike Falcon® platform — including next-generation endpoint protection, cyber threat intelligence gathering and reporting operations, and a 24/7 proactive threat hunting team — the CrowdStrike Services team helps customers identify, track and block attackers in real time. This unique approach allows CrowdStrike to stop unauthorized access faster and prevent further breaches. CrowdStrike also offers proactive services so organizations can improve their ability to anticipate threats, prepare their networks, and ultimately stop breaches.

ABOUT CROWDSTRIKE SERVICES

CrowdStrike Services

FALCON NETWORK SECURITY MONITORING

© 2020 CrowdStrike, Inc. All rights reserved.

Learn more at www.crowdstrike.com/services/

Email: [email protected]

WHY CHOOSE CROWDSTRIKE?

CrowdStrike Falcon Network Security Monitoring provides an extensive network security monitoring capability for detection, response and threat hunting.

Global threat indicators: CrowdStrike uses machine learning combined with CrowdStrike Intelligence IOCs and IOAs to detect malicious activity across security events globally

Efficient threat hunting: Falcon Network Security Monitoring provides the extra visibility necessary to detect new attacks and enable faster, more efficient threat hunting across all of the data traversing your network

Network-level detection: Falcon Network Security Monitoring uses industry-standard signatures for efficient and in-depth intrusion detection and file-level malware detection